diff options
author | Moritz Muehlenhoff <jmm@debian.org> | 2011-01-30 11:29:31 +0000 |
---|---|---|
committer | Moritz Muehlenhoff <jmm@debian.org> | 2011-01-30 11:29:31 +0000 |
commit | d3f3145fd890f6769590bc132bb0d7edf80fafd5 (patch) | |
tree | b1a9e417ea6b5d8bd58e49ada34a9c384232c03d /retired/CVE-2010-0435 | |
parent | 7196d474f645fb167632797b8734e11993260232 (diff) |
retire issues
git-svn-id: svn+ssh://svn.debian.org/svn/kernel-sec@2178 e094ebfe-e918-0410-adfb-c712417f3574
Diffstat (limited to 'retired/CVE-2010-0435')
-rw-r--r-- | retired/CVE-2010-0435 | 15 |
1 files changed, 15 insertions, 0 deletions
diff --git a/retired/CVE-2010-0435 b/retired/CVE-2010-0435 new file mode 100644 index 00000000..a03973d0 --- /dev/null +++ b/retired/CVE-2010-0435 @@ -0,0 +1,15 @@ +Candidate: CVE-2010-0435 +Description: + kvm null ptr dereference +References: + http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0435 +Notes: + jmm> RHEL patch commited as patches/CVE-2010-0435-kvm-kernel-fix-null-pointer-dereference.patch + jmm> The kernel.org version is quite different, though. Maybe it's only exploitable in + jmm> combination with the plethora of KVM patches added by Red Hat? +Bugs: +upstream: released (2.6.34) +2.6.32-upstream-stable: released (2.6.32.27) +linux-2.6: released (2.6.32-29) [bugfix/all/stable/2.6.32.27.patch] +2.6.26-lenny-security: released (2.6.26-26lenny2) [bugfix/x86/kvm-vmx-fix-vmx-null-pointer-dereference-on-debug-register-access.patch] +2.6.32-squeeze-security: released (2.6.32-29) [bugfix/all/stable/2.6.32.27.patch] |